---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. Join the FREE BETA test of the Network Software Inspector (NSI)! http://secunia.com/network_software_inspector/ The NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications. ---------------------------------------------------------------------- TITLE: eScan Products Agent Service Missing User Authentication SECUNIA ADVISORY ID: SA23809 VERIFY ADVISORY: http://secunia.com/advisories/23809/ CRITICAL: Less critical IMPACT: Security Bypass WHERE: >From local network SOFTWARE: eScan Corporate Edition 8.x http://secunia.com/product/13721/ eScan Anti-Virus for Windows 8.x http://secunia.com/product/14097/ eScan Enterprise Edition 8.x http://secunia.com/product/14094/ eScan Internet Security Suite 8.x http://secunia.com/product/14093/ eScan Professional Edition 8.x http://secunia.com/product/14098/ eScan Virus Control Edition 8.x http://secunia.com/product/14096/ eScan Web and Mail Filter 8.x http://secunia.com/product/14095/ DESCRIPTION: Secunia Research has discovered a security issue in various eScan products, which can be exploited by malicious, local users to gain escalated privileges or by malicious people to manipulate certain settings or gain knowledge of sensitive information. The MicroWorld Agent service (MWAGENT.EXE) runs with SYSTEM privileges and accepts connections from anywhere without implementing an authentication scheme. This allows anyone to send arbitrary commands to the service (default port 2222/tcp) allowing the following: 1) An unprivileged, local user can gain SYSTEM privileges by sending a SCASYS, SCADRV, or SCAMEM command, which invokes the Anti-Virus scanner in a window with SYSTEM privileges. Through this, it is possible to execute any command with the privileges of the scanner via e.g. the "View Log" functionality. 2) It is possible to disable/enable the eScan Anti-Virus Monitor process via the DISMON and ENAMON commands. 3) An unprivileged, local user can uninstall the product via the UNISOFT command and clicking "Yes" on a window that pops up on the user's desktop. 4) It is possible to disclose the contents of arbitrary files on the system via the SEND command. 5) It is possible to enable/disable the "Restrictive Scanning" configuration setting via the SLOMOD ("High Security (Slow Mode)") and FASMOD ("Medium Security (Fast Mode)") commands. 6) It is possible to enable/disable the eScan "File Rights" configuration setting via the ENFRIG and DIFRIG commands. 7) It is possible to change the server status via the STASER and STOSER commands. 8) It is possible to configure the update server via the UPDSET command. The security issue is confirmed in version 8.0.671.1. Other versions may also be affected. SOLUTION: The vendor has issued a Beta3 version, which fixes the security issue. A stable version should be available shortly. PROVIDED AND/OR DISCOVERED BY: Carsten Eiram, Secunia Research. ORIGINAL ADVISORY: Secunia Research: http://secunia.com/secunia_research/2007-45/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------